A Survey Report on Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

07/05/2023
by   Samir R Katte, et al.
0

A major security threat to an integrated circuit (IC) design is the Hardware Trojan attack which is a malicious modification of the design. Previously several papers have investigated into side-channel analysis to detect the presence of Hardware Trojans. The side channel analysis were prescribed in these papers as an alternative to the conventional logic testing for detecting malicious modification in the design. It has been found that these conventional logic testing are ineffective when it comes to detecting small Trojans due to decrease in the sensitivity due to process variations encountered in the manufacturing techniques. The main paper under consideration in this survey report focuses on proposing a new technique to detect Trojans by using multiple-parameter side-channel analysis. The novel idea will be explained thoroughly in this survey report. We also look into several other papers, which talk about single parameter analysis and how they are implemented. We analyzed the short comings of those single parameter analysis techniques and we then show how this multi-parameter analysis technique is better. Finally we will talk about the combined side-channel analysis and logic testing approach in which there is higher detection coverage for hardware Trojan circuits of different types and sizes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/21/2021

Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging

The threat of hardware Trojans (HTs) and their detection is a widely stu...
research
04/03/2020

Hardware Trojan with Frequency Modulation

The use of third-party IP cores in implementing applications in FPGAs ha...
research
11/05/2018

TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint

Conventional Hardware Trojan (HT) detection techniques are based on the ...
research
02/01/2021

Side-Channel Trojan Insertion – a Practical Foundry-Side Attack via ECO

Design companies often outsource their integrated circuit (IC) fabricati...
research
10/01/2019

Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream

The threat of inserting hardware Trojans during the design, production, ...
research
01/16/2022

Variability aware Golden Reference Free methodology for Hardware Trojan Detection Using Robust Delay Analysis

Many fabless semiconductor companies outsource their designs to third-pa...
research
12/21/2019

Socio-network Analysis of RTL Designs for Hardware Trojan Localization

The recent surge in hardware security is significant due to offshoring t...

Please sign up or login with your details

Forgot password? Click here to reset